Best Practices for Identity Access Management (IAM) & Authentication Heading into 2023
Date: Friday, December 16th at 9 a.m. PT / 12 noon ET
With compromised credentials becoming one of the key vectors of attack by threat actors, Identity and Access Management (IAM) & along with Robust authentication are the vital components to protecting employee accounts and customer data. Ian Thornton-Trump CD is going to walk through how IAM and Authentication are the starting path to Zero Trust and outline a high level plan to protect accounts using a three stage approach “Implement, Monitor and Respond” to IAM & Authentication based cyber-attacks. IAM and Authentication is one of those rare security controls which not only protect employee accounts but also protects customer data and the processes and systems which are the crown jewels of your organization. If you need to take on one security project, start your journey towards Zero Trust and protect employee and customer data – you can’t pick a better project than focusing on IAM and Authentication which in the opinion of this presenter provide more security and business value than ever before.
Here is the AGENDA:
9 a.m. PT / 12 noon ET
Best Practices for Identity Access Management & Authentication Heading into 2023
9:45 a.m. PT / 12:45 p.m. ET
Hottest Third-Party Solutions
About the presenter:
Ian Thornton-Trump, CISO, Cyjax
Ian Thornton-Trump CD is an ITIL certified IT professional with 25 years of experience in IT security and information technology. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF Military Police Reserves and retired as a Public Affairs Officer in 2013. After a year with the RCMP as a Criminal Intelligence Analyst, Ian worked as a cyber security analyst/consultant for multi-national insurance, banking and regional health care verticals.
Today, as Chief Information Security Officer for Cyjax Ltd. (UK) & Chief Technical Officer of Octopi Managed Services Inc. (Canada), Ian has deep experience with the threats facing small, medium and enterprise businesses. His research and experience have made him a sought-after cyber security consultant specializing in building security operations, working as a vCISO, and sharing his passion for building effective cyber threat intelligence programs for small, medium, and enterprise organizations.